ascon / ascon-hardwareLinks
NIST LWC Hardware Reference Implementation of Ascon v1.2
☆27Updated 2 years ago
Alternatives and similar repositories for ascon-hardware
Users that are interested in ascon-hardware are comparing it to the libraries listed below
Sorting:
- Side-Channel Analysis Library☆97Updated 3 weeks ago
- Hardware Design of Ascon☆25Updated last week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆63Updated 2 years ago
- Side-channel analysis setup for OpenTitan☆36Updated last month
- ☆60Updated 4 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 3 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆37Updated 3 years ago
- David Canright's tiny AES S-boxes☆28Updated 11 years ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 8 years ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆18Updated 2 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆37Updated 4 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆40Updated this week
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆34Updated this week
- Cryptanalysis of Physically Unclonable Functions☆88Updated last year
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆19Updated 5 years ago
- ☆51Updated last year
- SILVER - Statistical Independence and Leakage Verification☆14Updated 3 months ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆37Updated 5 years ago
- An Implementation of the Number Theoretic Transform☆48Updated 2 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆23Updated 11 months ago
- ☆11Updated 3 years ago
- Defense/Attack PUF Library (DA PUF Library)☆50Updated 5 years ago
- ☆12Updated last year
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆41Updated last week
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆11Updated 3 years ago
- XCrypto: a cryptographic ISE for RISC-V☆93Updated 2 years ago
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆105Updated 2 years ago
- ☆23Updated 5 years ago
- ☆10Updated 5 years ago